Abstract
Honey Cipher Structure is one of such secured techniques in cryptography. There are many structures available in security, Honey Cipher structure is new model into provide security for plaintext of alphabets as well as numeric’s. I planned to implement, this structure with eight levels first level contains eight elements, from first level to last level one element is decreased, and the last level contains only one element. In this honey cipher structure first level filled by the password and repeated characters are omitted in the password, password may also contains numeric’s. After filling the password remaining levels are filled by the rest of the characters. This is reason sender can have the confident that the transferred message have secured. Honey structure is created by filling all characters and numeric’s, next step honey form is converted into Honey cipher Structure. This structure represents the three digits of numbers, this form is called as honey cipher structure, and this can be protected the message. But to provide more security, this three digit numbers are considered as ASCII decimal values. This ASCII Decimal value is converted into Binary code; by applying the Least Significant Bit (LSB) technique on this binary code we can get long distance binary value. This binary value is associated with Hexadecimal symbol. These Hexadecimal symbols are printed as a cipher text. This cipher text is transferred to receiver. Receiver decrypts this cipher text in reverse order to read the original message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rambabu M, Shiva Prasad MV, Madhusoodanan Nair M (2016) Publish Paper on Honey Cipher Structure, IJIET, Special Issue NCRTEEFOSS-2016. ISSN: 2319–1058
Fukunga T, Takahashi J (2010) Practical fault attack on a Cryptographic LSI with ISO/IEC 18033–3 Block ciphers, pp 84–92
Rambabu M, Ramana N, Sadanadam M, Enhanced honey cipher structure with multiple cipher structures. www.ijcrt.org, © 2017 IJCRT, Dec 2017| ISSN:2320-2882
Stalling W, Network security essentials. 3rd edn
Ehrsam W et al (2010) A cryptography key management scheme for implementing the data encryption standard. IBM Syst J 7:125
Barenghi A et al (2010) Low voltage fault attacks to AES and RSA on general purpose processors. IACR Eprint Arch 130
Security using Pyramidal Cipher Form IJFTE Journals
Katz J, Lindell Y (2008) Introduction to modern cryptography. Chapman and all/CRC
ASCII or EBCDIC, Translation Tables from Google Wikipedia
http://www.malighting.com, for conversation from ASCII decimal values to character symbols
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Rambabu, M., Ramana, N. (2020). Improved Honey Cipher Structure Using Least Significant Bit Techniques. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_71
Download citation
DOI: https://doi.org/10.1007/978-981-15-1420-3_71
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1419-7
Online ISBN: 978-981-15-1420-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)